answersLogoWhite

0


Best Answer

Dictionary attack

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What layer programs access the network?

Network Layer


It protects a computer network from unauthorized access it may be a hardware devices or software programs or a combination of the two?

That sounds like a firewall.


How can you control the access to a system?

You can control the access to a system by buying or downloading certain programs. An example of a program that gives you the ability to control the access to a system is Network Access Control.


It's a unique combination of characters that allows a user to gain access to computer resources such as programs data and files?

PASSWORD is the code for access Programs DATA & Files.


The primary computer in a network such as at a business or school that individual users can access for programs and data is usually referred to as a what?

server


How do you make a Wireless network secure?

By encrypting the information between a computer and the wireless access point. Several methods are available of which WPA and WPA2 are now the most common


How do you access a dictionary directly from Google?

You can access Google's online web application which allows you to directly access Google's online dictionary and find the definitions of all words in the dictionary.


What controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data, and information?

Server


Where can I find information on virtualization cloud computing?

Cloud computing is the idea that, instead of having a computer with all your programs, data and information, you will have a computer with access to the 'cloud' which could be any network, most often the internet, and your data and programs will be provided as 'services' by companies on the network.


What is the purpose of using CheckPoint VPN programs?

The purpose of using CheckPoint VPN programs is to securely connect remote users or offices to a private network, allowing for encrypted communication and access to resources as if they were directly connected to the network locally.


What controls access to the hardware software and other resources on the network and provides a centralized storage area for programs data and information?

False,Server controls access to the hardware, software, and the other resources on the network and provides a centralized storage area for program, data, and information.


Is remote access available to view a PC anywhere in the world?

There is indeed remote access to view your PCs frome diffferent places. You can transfer files, run programs, access network resources and do other things on your PC even if you are not in front of it.